Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Management
Information Systems
(BCA Part-III)
Kusumlata Bhargava
Revised by: Neha Jain
Revised By: Ms Jyoti Sharma
Deptt. of Information Technology
Biyani Girls College, Jaipur
Published by :
Think Tanks
Biyani Group of Colleges
ISBN: 978-93-82801-80-1
While every effort is taken to avoid errors or omissions in this Publication, any mistake or
omission that may have crept in is not intentional. It may be taken note of that neither the
publisher nor the author will be responsible for any damage or loss of any kind arising to
anyone in any manner on account of such errors and omissions.
2. Overview of MIS
2.1Introduction, Objectives & Characteristics of MIS
2.2Salient Features of Computer
2.3Organization Need for MIS
2.4Factors Responsible for Development of MIS
2.5Prerequisites of an Effective MIS
2.6Introduction & Characteristics of Decision Making
2.7Decision Support System (DSS)
2.8Hebert A. Simon‗s Decision Support System
Model
2.9Introduction & Objectives of MIS Planning
6
3. Development of MIS
3.1Steps of System Implementation
3.2Organization Evolution of MIS
3.3Pitfalls in MIS Development
3.4System Documentation
4. Functional MIS
4.1MIS for Finance
4.2MIS for Marketing
4.3MIS for Production
4.3MIS for HRM
□□□
Chapter-1
Introduction to MIS
Environment
System Boundary
8
Characteristics of System :
Following characteristics are present in all systems :
a) Organization
b) Interaction
c) Interdependence
d) Integration
e) Central Objective
Organization : Organization implies structure and order. It is the arrangement
of components that helps to achieve objectives. Hierarchical relationship
starting with the president on top and leading down ward to the blue collar
worker represent the organization structure
Interaction : Interaction refers to the procedure in which each component
interact with other components of the system. In an organization, for example
purchasing must interact with product, advertising with sales and payroll with
personnel.
Interdependence : Independence is concerned with how a system is tied
together; it is more than sharing a physical part or location. It means that parts
of the system part or location with in the system, even through each part
performance. A unique function successful integration will typically produce a
better request as whole rather than if each component works independently.
Central Objective : Objective may be real or stated. Objective is determined
by higher management and user must be aware about the central objective
well in advance.
production, distribution of goal and sources of profit and income. The total
system consists of all the objects, attributes and relationship necessary to
accomplish an objective given a number of constraints.
Sub systems are the smaller systems within a system. Super system denotes
extremely large and complex system
Permanent and Temporary System : A permanent system is a system
enduring for a time span that is long relative to the operation of human.
Temporary system is one having a short time span.
Natural and Man Made System : System which is made by man is called
man made system. Systems which are in the environment made by nature are
called natural system.
Deterministic and Probabilistic : A Deterministic system is one in which the
occurrence of all events is perfectly predictable. If we get the description of
the system state at a particular time, the next state can be easily predicted.
Probabilistic system is one in which the occurrence of events cannot be
perfectly predicted.
Man-made Information System : It is generally believed that the information
reduces uncertainty about a state or event. An information system is the basis
for interaction between the user and the analyst. It determines the nature of
relationship among decision makers.
An information system may be defined as a set of devices, procedures and
operating system designed around user-base criteria to produce information
and communicating it to the user for planning control and performance.
channels. It works within the framework of the business and its stated policies.
semi structured decision. The decision support systems support, but do not
replace, judgments of managers.
Office Automation System (OAS) : Office Automation Systems are among
the newest and most rapidly expanding computer based information systems.
They are being developed with the hope and expectation that they will
increase the efficiency and productivity of office workers, typists, secretaries,
administrative assistants, staff professionals, managers and others.
Information Generation
Individual (Low Level) : At the lowest level the personal information need
of staff exists throughout the organization. Examples include correspondence,
reports and spreadsheets. In most organizations, staff must struggle with
using e-mail to meet their information management needs. While staff
generally recognizes the inadequacy of e-mail, they have few other
approaches or technologies at their disposal.
Managing the Levels : While managing the information at each of the three
levels, consider aspects need consideration:
An information management solution must be provided for staff at each
of the three levels.
If corporate solutions aren't provided, then staff will find their own
solutions. This is the source of poor-quality intranet sub-sites, and other
undesirable approaches.
A clear policy must be developed, outlining when and how it will apply
at all the three levels and how information should be managed at each
level.
Processes must be put in place to 'bubble up' or 'promote' information
from lower levels to higher levels. For example, some team-generated
information will be critical for the whole organization.
As much as possible, a seamless information management
environment should be delivered that covers all the three levels.
Q.6 What do you understand by Information System? Discuss various type
of Information.
Ans.: A business has several information systems :
(A) Formal Information System
(B) Informal Information System
(C) Computer Based Information System
Formal Information System : It is based on organizational chart represented
by the organization.
Informal Information System : It is an employee based system designed to
meet personal and vocational needs and to help in the solution of work -
related problems. It also funnels information upward through indirect
channels. It works within the framework of the business and its stated policies.
Management Information Systems 15
techniques that help to generate the information that are required for the
business system. Selection of the appropriate technology has got bearing on
effectiveness of the bridge.
People : People generate the required information and apply the same for
business planning, control and decision making. The attitude and aspiration of
the people involved in generating and utilizing the information has a bearing
on effective use of integrated system.
Business : The business function and the environment in which the business
organization have an impact on the entire integration exercise.
□□□
Chapter-2
Overview of MIS
Data
Information Generation
22
Input
Objectives of MIS :
Data Capturing : MIS capture data from various internal and external sources
of organization. Data capturing may be manual or through computer terminals.
Source
Data Disseminatio
Captur Processing
Retrieval
Storage
of Data
Objectives of MIS
Characteristics of MIS :
Systems Approach : The information system follows a systems approach.
Systems approach means taking a comprehensive view or a complete look at
the interlocking sub-systems that operate within an organization.
Management Oriented : Management oriented characteristic of MIS implies
that the management actively directs the system development efforts. For
planning of MIS, top-down approach should be followed. Top down approach
suggests that the system development starts from the determination of
management‘s needs and overall business objective. To ensure that the
implementation of system‘s polices meet the specification of the system,
continued review and participation of the manager is necessary.
Need Based : MIS design should be as per the information needs of
managers at different levels.
Exception Based : MIS should be developed on the exception based also,
which means that in an abnormal situation, there should be immediate
reporting about the exceptional situation to the decision –makers at the
required level.
24
Central database : In the MIS there should be common data base for whole
system
Q.6 What do you understand by Decision Making? Discuss the nature and
characteristics of Decision?
Ans.: The word ―decision ―is derived from the Latin word ―decido‖. Which
means ―A decision, therefore is
A Settlement
A fixed intuition to bringing to a conclusive result
A judgment
A resolution
Decision : A decision is the choice out of several options made by the
decision maker to achieve some objective in a given situation.
Business Decision : Business decisions are those which are made in the
process of conducting business to achieve its objective in a given situation.
Characteristic of Business Decision Making :
a) Sequential in nature.
b) Exceedingly complex due to risk and trade off.
c) Influenced by personal values.
30
Q.7 What is DSS? What is the purpose of Decision Support System in MIS.
Ans.: Decision Support System refers to a class of systems which support in the
process of decision making and does not always give a decision it self.
Decision Support Systems (DSS) are a specific class of computerized
information system that supports business and organizational decision-making
activities. A properly designed DSS is an interactive software -based system
intended to help decision makers compile useful information from raw data,
documents, personal knowledge, and/or business models to identify and solve
problems and make decisions
DSS is an application of Hebert Simon model, as discussed, the model has
three phases :
i) Intelligence
ii) Design
iii) Choice
32
The DSS basically helps in the information system in the intelligence phase
where the objective is to identify the problem and then go to the design phase
for solution. The choice of selection criteria varies from problem to problem.
It is therefore, required to go through these phases again and again till
satisfactory solution is found.
In the following three phase cycle, you may use inquiry, analysis, and models
and accounting system to come to rational solution.
These systems are helpful where the decision maker calls for complex
manipulation of data and use of several methods to reach an acceptable
solution using different analysis approach. The decision support system helps
in making a decision and also in performance analysis. DSS can be built
around the rule in case of programmable decision situation. The rules are not
fixed or predetermined and requires every time the user to go through the
decision making cycle as indicated in Herbert Simon model.
Attributes :
i) DSS should be adaptable and flexible.
ii) DSS should be interactive and provide ease of use.
iii) Effectiveness balanced with efficiency (benefit must exceed cost).
iv) Complete control by decision-makers.
v) Ease of development by (modification to suit needs and changing
environment) end users.
vi) Support modeling and analysis.
vii) Data access.
viii)Standalone, integration and Web-based
DSS Characteristics :
i) Support for decision makers in semi structured and unstructured
problems.
ii) Support managers at all levels.
iii) Support individuals and groups.
iv) Support for interdependent or sequential decisions.
v) Support intelligence, design, choice, and implementation.
vi) Support variety of decision processes and styles
Management Information Systems 33
Q.8 Discuss in brief the Hebert A. Simon ‘Decision Support System Model’.
Define the term Intelligence, Design and Choice as Model.
OR
Discuss the essential steps in process of decision making.
Ans.: There are three phases in Hebert Simon model :
INTELLIGENCE
DESIGN
CHIOCE
Intelligence : In this phase MIS collects the raw data. Further the data is
sorted and merged with other data and computation are made, examined and
presented. In this phase, the attention of the manager is drawn to the entire
problem situation, calling for a decision.
Design : Manager develops a model of problem situation on which he can
generate and test, summarizing the different decision alternatives and test the
feasibility of implementation. Assess the value of the decision outcome.
Choice : In this phase the manager evolves a selection criterion and selects
one alternative as decision based on selection criteria.
In these three phases if the manager fails to reach a decision, he starts the
process all over again from intelligence phase where additional data and
information is collected, the decision making process is refined, the selection
criteria is changed and a decision is arrived at.
Q.9 What is MIS Planning? Discuss the need and objectives of MIS Planning.
OR
What are the objectives and need of MIS Planning?
34
Ans.: The plan for development and its implementation is a basic necessity for
MIS. In MIS the information is recognized as major resource like capital and
time. If this resource has to be managed well, it calls upon the management to
plan for it and control it, so that the information becomes a vital resource for
the system. The management information system needs good planning. This
system should deal with the management information not with data
processing alone. It should provide support for the management planning,
decision making and action. It should provide support to the changing needs
of business management.
A long range MIS plan provides direction for the development of the system
and provides a basis for achieving the specific targets or tasks against time
frame.
Following are the contents of MIS planning :
MIS Goals and Objectives : It is necessary to develop the goal and
objectives for the MIS which will support the business goals. The MIS goals
and objectives will consider management philosophy, policy constraints,
Business risk, internal and external environment of the organization and
business. The goals and objectives of the MIS would be so stated that they
can be measured. The typical statements of the goals can be providing online
information on the stock and market; the query processing should not exceed
more than three seconds and the like.
Strategy for Plan Achievement : The designer has to take a number of
strategic decisions for the achievement of MIS goals and objectives. They are
d) Development Strategy : Ex. an online, batch , a real time.
e) System Development Strategy : Designer selects an approach to
system development like operational verses functional, accounting
verses analysis.
f) Resources for the Development : Designer has to select
resources.
Resources can be in-house verses external, customized or use of
package.
g) Manpower Composition : The staff should have the staffs of an
analyst, and programmer.
The Architecture of MIS : The architecture of the MIS plan provides a system
and subsystem structure and their input, output and linkage. It spells out in
details the subsystem from the data entry to processing, analysis to modeling
and storage to printing.
Management Information Systems 35
Advantages of Prototyping :
i) Reduced Time and Costs : Prototyping can improve the
quality
of requirements and specifications provided to developers. Early
determination of what the user really wants can result in faster
and less expensive software.
ii) Improved and Increased User Involvement : Prototyping
requires user involvement and allows them to see and interact
with a prototype; allowing them to provide better and more
complete feedback and specifications. Since users know the
problem better than anyone, the final product is more likely to
satisfy the users desire for look, feel and performance.
38
Disadvantages of Prototyping :
i) Insufficient Analysis : Since a model has to be
created,
developers will not properly analyse the complete project. This
may lead to a poor prototype and a final project that will not
satisfy the users.
ii) User Confusion of Prototype and Finished System : Users
can
begin to think that a prototype, intended to be thrown away, is
actually a final system that merely needs to be finished or
polished. Users can also become attached to features that were
included in a prototype for consideration and then removed
from the specification for a final system.
iii) Excessive Development Time of the Prototype : A
key
property to prototyping is the fact that it is supposed to be done
quickly. If the developers forget about this fact, they will develop
a prototype that is too complex.
iv) Expense of Implementing Prototyping : The start up costs
for
building a development team focused on prototyping may be
high. Many companies have to train the team for this purpose
which needs extra expenses.
Pers
En
Empl
** comment
last-name = {legal-character}
legal-character = [A-Z|a-z|0-9|'|-| | ]
Typ
Custo
6 or More
Deale
Less than 6
Discount
Policy
Educational
Institution
or individual
Flow Lines
Flowchart Symbols
Advantages of Using Flowcharts :
i) Communication : Flowcharts are better ways of
communicating the logic of a system to all concerned.
ii) Effective Analysis : With the help of flowchart, problems
can be analyzed in more effective way.
iii) Proper Documentation : Program flowcharts serve as a
good program documentation, which is needed for various purposes.
iv) Efficient Coding : The flowcharts act as a guide or blueprint
during the systems analysis and program development phase.
v) Proper Debugging : The flowchart helps in debugging
process.
vi) Efficient Program Maintenance : The maintenance of
operating
program becomes easy with the help of flowchart. It helps the
programmer to put efforts more efficiently on that part.
Management Information Systems 45
Process
The Flow : A flow is represented graphically by an arrow into or out of a
process; The flow is used to describe the movement of chunks, or packets of
information from one part of the system to another part. Thus, the flows
represent data in motion, whereas the stores represent data at rest.
Management Information Systems 47
An example of a flow :
The name represents the meaning of the packet that moves along the
flow. A corollary of this is that the flow carries only one type of packet, as
indicated by the flow name. It is sometimes useful to consolidate several
elementary dataflows into a consolidated flow.
The Store : The store is used to model a collection of data packets at
rest. The notation for a store is two parallel lines or a rectangle open with
one side.; Typically, the name chosen to identify the store is the plural of
the name of the packets that are carried by flows into and out of the store.
other end of the flow that is responsible for making the change to the
store.
The Terminator : The next component of the DFD is a terminator; it is
graphically represented as a rectangle, Terminators represent external
entities with which the system communicates. Typically, a terminator is a
person or a group of people, for example, an outside organization or
government agency, or a group or department that is within the same
company or organization, but outside the control of the system being
modeled. In some cases, a terminator may be another system, for
example, some other computer system with which your system will
communicate.
Q.13 What do you understand by System Analysis and Design? Discuss the
various steps in System Analysis and Design Process?
OR
What are different stages in System Development Life Cycle?
Ans.: SAD refers to the process of examining a business situation with the intent of
improving it through better procedures & methods. System Development
generally is thought of as having two major components :
a) System Analysis
b) System Design
System Design is the process of planning. We must thoroughly understand the
existing system and data mine how computer desk can be used to make its
operation more effective. System design specifies how to achieve objectives
System Analysis is the process of gathering and interpreting facts diagnosing
problems and using information to recommend improvement to system. It
specifies what the system should do. The system analysis is management
between techniques which helps us in designing a new system or improving
an existing system
System Development Life Cycle : System Development life cycle (SDLC) is
used to plan and manage the system development process. Although it is
primarily identified with structured analysis, the SDLC describes activities and
functions that systems developers typically perform, regardless of how those
activities and functions fit into a particular methodology. The SDLC model
includes the following steps :
i) Systems Planning
ii) Systems Analysis
iii) Systems Design
iv) Systems Implementation
v) Systems Operation and Support
The SDLC is pictured as a waterfall model where the result of each phase,
often called an end product or deliverable, flows down into the next phase. In
reality, the systems development process is dynamic, and constant change is
common.
Systems Planning : A system‘s planning usually begins with a formal request
to the IT department, called a system‘s request that describes problems or
desired changes in an information system or a business process. A system‘s
52
request can come from a top manager, a planning team, a department head,
or the IT department itself. The request can be very significant or relatively
minor. A major request might involve a new information system or the
replacement of an existing system that cannot handle current requirements. In
contrast, a minor request might ask for a new feature or a change to the user
interface in current system. The purpose of the planning phase is to identify
clearly the nature and scope of the business opportunity or problem by
performing a preliminary investigation, often called a feasibility study. The
preliminary investigation is a critical step because the outcome will affect the
entire development process. The end product, or deliverable, is a report that
describes business considerations, reviews anticipated benefits and costs,
and recommends a course of action based on economic, technical, and
operational factors.
Systems Analysis : The purpose of the systems analysis phase is to
understand business requirement and build a logical model of the new
system. The first step is requirement modeling, where you define and describe
business process. Requirement modeling continue the investigation that
began during systems planning and involves various fact-finding techniques,
such as interview, surveys, observation, and sampling. During the next tasks,
data modeling, process modeling, and object modeling, you develop a logical
model of business process the system must support. The model consists of
various types of diagrams, depending on the methodology being used.
The end product for the systems analysis phase is the System Requirements
Document. The systems requirements document describes management and
user requirements, alternative plans and costs, and analysis your
recommendation. Looking ahead to design and implementation, several
possibilities exist: develop a new system in-house, purchase a commercial
package, or modify an existing system.
Systems Design : The purpose of systems design is or create a blueprint for
the new system that will satisfy all documented requirements, whether the
system is being developed in-house or purchased as a package. During
systems design, you identify all necessary outputs, inputs, interfaces, and
processes. In addition, you design internal and external controls, including
maintainable, and secure. The design is documented in the System Design
Specification and presented to management and users for their review and
approval. Management and user involvement is critical to avoid any
misunderstandings about what the new system will do, how it will do it, and
what it will cost.
Management Information Systems 53
not outweigh the costs, then it is not worth going ahead. The process used for
economic feasibility is cost benefit analysis.
Management Feasibility : Management feasibility is determination of
whether a proposed system will be accepted by management people.
Social Feasibility : Social feasibility is determination of whether a proposed
system will be acceptable to the people or not. .This determination typically
examines the probability of the project being acceptable by the group directly
affected by the proposed system change.
Legal Feasibility : Legal feasibility is a determination of whether a proposed
project infringes on known Act, status, as well as any pending legislation.
Time Feasibility : Time feasibility is a determination of whether a proposed
project can be implemented fully within time frame. If a project takes too much
time it is likely to be rejected.
Cost - Benefit Analysis : Since the cost plays an important role in deciding
the new system, it must be identified and estimated properly. Benefits of
different type can be grouped on the basis of advantages they provide to the
management. Benefits of a project include four types:
Cost Saving Benefits : Leads to reductions in administrative and operational
costs, example reduction in the clerical staff.
Cost Avoidance Benefits : Those which eliminate future administrative and
operational costs, example no need to hire additional staff in future to handle
administrative activity.
Improved Service Level Benefits : Those where the performance of a
system is improved by new computer based method, example registering a
student in fifteen minutes rather than 30 minutes.
Improved Information Benefit : Those where computer based methods lead
to better information for decision making. A system that reports most-improved
fifty customers, as measured by an increase in sales is an improved-
information.
Categories of Costs and Benefits : The cost associated with the system are
expenses, outlays or losses arising from developing and using the system.
Costs and Benefits can be classified as follows :
a) Tangible or Intangible Costs and Benefits : Tangible refers to
ease
with which costs or benefits can be measured. An outlay of cash for
any specific item or activity is referred to as a tangible cost.
Costs that are known to exist but their financial value cannot be exactly
measured are referred to as intangible costs. The estimation is only an
Management Information Systems 55
□ □
□
Chapter-3
Development of MIS
For a particular MIS, The designer may select the level at which measurement
is to take place based upon specific objectives of the MIS. It is probably rare
that a measurement of the total system is attempted at the system level. At
the system level, judgment of broad concepts might be employed :
62
(i) System Integrity : How well the subsystems integrated into the total system
without redundancy? How flexible is the system? How easily may the system be
explained?
(ii) Operation Integrity : How skilled are the people operating the system?
What
backup is there to prevent the system breakdown in the event of loss of key
personnel or equipment failure?
(iii) Internal Integrity : How well does the system do what it is
supposed
to do? How valid are the system outputs? How sources is the system
against human error, manipulation, sabotage, or theft.
(iv) Procedural Integrity : How good is the documentation of the
system
and procedures? Are procedures such that employee are motivated to
follow them? How well are procedures followed in practice? What
controls ensure that the procedures are followed?
Formulation of the Measurement : Once the variables of interest have been
identified, a table should be set up to formalize the measurement. Table can
contain the costs and benefits.
□□□
Chapter-4
Functional MIS
Q.1 Write short notes on MIS for Finance, MIS for Marketing, MIS for
Production, MIS for HRM.
Ans.: (A) MIS for Marketing : In order to pursue market opportunities as well as
anticipate marketing problem, manager need to collect comprehensive and
reliable information. Managers cannot carryout marketing analysis, planning,
implementation and control without monitoring and researching customers ,
competitors, dealers and their sales and cost data. Every firm has many
information flows of interest to marketing management. Many companies are
studying their executive‘s information needs and design information system
for marketing to meet these needs. Instead of plethora of unrelated data, an
MIS combines various inputs and present integrated reports.
Marketing
Information
Marketing Environment
Target Markets
Marketing Channels
Competitors
Public
Macro Environment
Forces
Year - 2011
Time allowed : One Hour Maximum Marks : 20 The question pape r contains 40 multiple
choice questions with four choices and
students will have to pick the correct one (each carrying ½ mark).
4. What is management?
(a) An Art
(b) A Science
(c) Both (a) and (b)
(d) Neither (a) no
19. …………shows how data moves through an information system but does not
show
program logic.
(a) DFD (b) Structured charts
(c) Decision tables (d) Decision tree ()
26. To run old and new system at the same time for a specified time period, this
approach
is known as :
(a) Parallel (b) Pilot
(c) Phased (d) Direct cut ()
30. In………..type of decision- making, both the leader and subordinate work
together to arrive as a decision.
(a) Facilitative
(b) Authoritative
(c) Delegative
(d) None of the above ()
33. What kind of decisions have been taken mostly by lower management?
(a) Strategic decisions
(b) Policy decisions
(c) Operational decisions
(d) All of the above ()
___________
80
DESCRIPTIVE PART-II
Year- 2011
Time allowed : 2 Hours Maximum Marks : 30
Atte mpt any four descriptive types of questions out of the six. All questions carry 7½
marks each.
Q.1 What is MIS? Explain various components and objectives of MIS in detail.
Q.3 Define the terms Data, Information and Knowledge. Explain different characteristics
and quatities of information.
Q.6 Explain :
(a) Types of Decisions
(b)Simon‟s model of decision- making
(c) Role of MIS for marketing.
________
Management Information Systems
OBJECTIVE PART- I
Year - 2010
Time allowed : One Hour Maximum Marks : 20 The question pape r contains 40 multiple
choice questions with four choices and
students will have to pick the correct one (each carrying ½ marks).
1. MIS means:
(a) Computers
(b) Communication
(c) Both a and b
(d) None of the a
(c) Management
(d) None of the above ()
8. Decision to set up a new factory is a:
(a) Programmed Decision
(b) Non-Programmed Decision
(c) Semi Programmed Decision
(d) None of the above ()
9. A balanced expenditure on hardware and software will increase the chance of successful implementation of MIS:
(a) True
(b) False
(c) Can't say
(d) None of the above ()
10. The conditions immediately outside a system is known as:
(a) The environm
(c) The interface
as:
(a) Open
(c) Deterministic
(a) OAS
(b) DSS
(c) MIS
(d) None of the above ()
24. Business expert systems are specifically based on:
(a) Software Engineering (b) Artificial Intelligence
(c) Numerical Analysis (d) Automate Theory ()
84
25. Which of the function of Financial System?
(a) Controlling the receipts records (b) Maintaining statutory records
(c) Numerical analysis (d) All of the above ()
26. Information used in short term planning which is used for management control level
is the:
(a) T
(c) O
28. Firewall is a :
(a) H
(b) S
(c) B
29. Which of the component of MIS?
(d) N
(a) Hardware
(b) Software
(c) Both a and b
(d) None of the above ()
30. Main approach to MIS development is:
dealing with:
(a) Uncertain situations
(c) Dynamic situation
DESCRIPTIVE PART-II
Year- 2010
Time allowed : 2 Hours Maximum Marks : 30
Atte mpt any four descriptive types of questions out of the six. All questions carry 7½
marks each.
________
Management Information Systems
OBJECTIVE PART- I
Year - 2009
(a) Information
(b) System
(c) Data
(d) None of the above ()
88
7. DSS means:
(a) Direct Support System
(b) Decision Support System
(c) Data Support System
(d) None of the above ()
8. Which one not a part of MIS?
(a) DBMS
(b) Networking
(c) Top management
(d) None of the above ()
9. MIS aims to fullfill the organization needs of:
(a) Operational staff
(b) Top management
(c) Middle management
(d) All of the above ()
10. MIS can be linked tot he disciplines:
(c) Database
(d) All of the abov
..............is one of the oldest and most traditional methods for develo
23.
systems:
(a) System development life cycle
(b) System maintenance
(c) System analysis
(d) None of the above ()
24. MIS support decision making in:
(a) People
( b) Computers
(c) Databases
(d) All of the abo
(a) Planning
(b) Directing
(c) Staffing
(d) All of the above ()
32. CAD is mainly used in:
(a) Database design
(b) Manufacturing design
(c) System analysis and design
(d) None of the above ()
33. A....................provider a picture of a sequence of activities:
(a) Flowcharts
(b) Decision Table
(c) Simulation
(d) None of the above ()
34. A well-defined MIS provides information to all level of management for:
(d) Netoworks ()
37. Which one of the following is not a sources of information:
(a) Internet
(b) Interviews
(c) Factories
(d) Survey ()
38. Structure of a MIS can be described in the:
1. (a) 2. (d)
11. (d) 12. (d)
21. (d) 22. (a)
31. (d) 32. (b)
_____________
Management Information Systems 93
DESCRIPTIVE PART - II
Year 2009
Time allowed : 2 Hours Maximum Marks : 30
Atte mpt any four questions out of the six. All questions carry 7½ marks each.
_______
94
OBJECTIVE PART- I
Year - 2008
(a) Embedded
(b) Timelines
(c) Relevant
(d) Action oriented ()
3. Which one is not a part of System Development Process:
(a) Testing
(b) Requirement analysis
(c) Total Quality Management
(d) Implementation ()
4. Which one of the following statement is correct:
(a) The study of MIS is about the use of computers
(b) More data means more information for managers
(c) MIS is made to support the lower management
(d) MIS is not a complete substitute for effective management ()
5. Which level of management needs detailed information the most:
(a) Lower Management
(b) Middle Management
(c) Top Management
(d) They all need it equally ()
6. Which entity is not related to the definition of system:
(a) Input
(b) Output
(c) Process
Management Information Systems 95
(a) Phase
(b) Parallel
(c) Plunge (cut off)
(d) Pilot ()
9. Metadata is included in:
(a) Data dictionary
(b) Database backup
(c) Meta- large data terminals
(d) Network protocols ()
10. In context of MIS, EDP stands of:
(a) DBMS
(b) Networking
(c) Top Management
(d) None of the above ()
19. What kind of decisions have been taken mostly by lower management :
(c) Understanding a system and its complexities for new setup development
or modification
(d) Train manager in mathematical analysis ()
37. Decision tables link conditions and:
(a) Program
(b) Actions
(c) Data
(d) Tables ()
38. Prototyping aims at:
_____________
100
DESCRIPTIVE PART – II
Year 2008
Q.1 (a) What do you understand by Management Information system? Explain the
challenges and pitfalls in the development of MIS?
(b) What kind of information are required for various levels lf management in
any
organization? Provide diagrams to justify your answer.
OBJECTIVE PART- I
Year - 2007
(a) Gives the meaning of the data names used in the system
(b) Defines the data types
(c) Defines all data elements and structures used in DFD
(d) None of the above ()
18. A software design description document only includes:
(a) Data dictionary (b) ER diagram
(c) DFD (d) All of the above ()
19. Backup and recovery procedure are necessary to:
(a) Recognize the disk
(b) Control the DBA
(c) Handle contingencies like files getting corrupts or becoming irretrievable
(d) None of the above ()
20. The sequence of steps following in a system study is:
(a) Problem definition, Systems Design, Systems Analysis, Programming
and Implementing
(b) System analysis, systems design and system implementation
______________
Management Information Systems
DESCRIPTIVE PART - II
Year 2007
Time allowed : 2 Hours Maximum Marks : 30 Atte mpt any four questions out of the six.
All questions carry 7½ marks each.
Q.1 (a) What is understood by the term MIS? How does it assist managers in their day to
day functioning?
(b) With the help of a suitable example, explain the concept of DSS.
Q.4 (a) What is meant by system analysis? Briefly describe the main objectives of
system analysis.
(b) What is meant by conceptual design of MIS?
_________
108
OBJECTIVE PART- I
Year - 2006
Time allowed : One Hour Maximum Marks : 20
The question pape r contains 40 multiple choice questions with four choices and student will have to pick the correct one (each carrying ½ mark) .
1. A system analyst designs a new system by:
(a) Adopting a developed system to the present environment
(b) Developing the system as a large, single unit
(c) Identifying subsystems and interfaces between subsystems
(d) None of the above ()
2. A feasibility study:
(a) Communicating to the user, quickly, how the system, when developed will
look and get a feedback
(b) Making the programmers understand how the system will work
(c) Giving the demonstration of the software tot he system manager
(d) All of the above ()
11. The MIS should developed by:
(a) Daily
(b) Weekly
(c) Monthly
(d) Only onan 'as needed' basis ()
14. Computer information system are most successful n providing information for:
(a) Subsystem
(c) Super system
1. (c) 2. (a)
11. (c) 12. (c)
21. (a) 22. (d)
31. (d) 32. (c)
114
DESCRIPTIVE PART - II
Year 2006
Time allowed : 2 Hours Maximum Marks : 30
Atte mpt any four questions out of the six. All questions carry 7½ marks each.
Q.1 (a) Define system and explain the various types of systems.
Q.2 (a) Define MIS and discuss the significance of MIS in an organization
(b) Explain various components of MIS.
GLOSSARY
topics and can be searched for specific phrases or comments. They are a
useful way to disseminate information that is of interest to many different
people.
Most computers have special slots called a bus to provide high-speed
connections to other devices. Various manufacturers make boards that fit
Bus into these slots. The processor can exchange data with these other devices,
but performance is sometimes constrained by the design of the bus.
A network organizing scheme in which each computer is attached to a
Bus network common transmission medium. Protocols are needed to determine when a
machine can transmit and to recover from collisions.
Also see workflow software. The concept that business actions have to be
Business process performed in a specific sequence. Managing the process entails finding
management efficiencies through automating or reordering. For example, purchasing
(BPM) expensive items requires discussions and approvals by a variety of
managers.
Business-to-business electronic commerce; sales by suppliers to other
Business to businesses over the Internet; often long-term relationships. See B2C and
business (B2B) EDI.
Business-to-consumer electronic commerce; purchases by individual
Business to consumers similar to traditional mail-order systems, but conducted on
consumer (B2C) secure Web sites over the Internet.
A collection of bits. Traditionally, 8 bits make up one byte. From binary
Byte arithmetic, an 8-bit byte can hold 2 to the 8th power, or 256, possible
numbers. In many systems a byte is used to hold one character.
A powerful programming language that is flexible and creates efficient
C code. A language commonly used to build complex applications and to
create commercial software products.
An object-oriented extension of the C programming language. It is
C++ commonly used to build commercial software. It produces efficient code
and supports the development of reusable objects.
An Internet connection device that translates local area network protocols
Cable modem to run over a television cable line. It can provide transmission speeds
around 1.5 Mbps. But the communication line is shared with other users.
A buffer between the processor and a slower device such as a printer, disk
drive, or memory chips. The cache generally consists of high-speed
Cache memory. Data is transferred in bulk to the cache. It is then pulled out as it
is needed, freeing up the processor to work on other jobs instead of
waiting for the slower device to finish.
The U.S. Act that makes it illegal to send commercial e-mail messages to
CAN-SPAM Act people who do not want to receive them. For business, the key is that it
makes e- mail messages legal, as long as all of the rules are followed.
Capability A system designed at the Carnegie Mellon Software Engineering Institute
120
Computer
information See management information system (MIS).
system (CIS)
In relational databases, a key that consists of more than one column. The
Composite key
columns are combined to yield a unique primary key.
A situation that arises when applications attempt to modify the same piece
of data at the same time. If two people are allowed to make changes to the
Concurrency same piece of data, the computer system must control the order in which it
processes the two requests. Mixing the two tasks will result in the wrong
data being stored in the computer.
Changing text and images on a Web site can be challenging, particularly
Content with thousands of pages and hundreds of contributors. Contributors can
management write changes in simple text format to a content management system
system which then formats and uploads the data to the Web site automatically.
The top level of a data flow diagram that acts as a title page and displays
Context diagram the boundaries of the system and displays the external entities that interact
with the system.
The concept that any process can be improved by continually evaluating
Continuous the system and making adjustments and refinements. The concept is also
quality applied to service processes, but relies on a measurable performance
improvement objective.
The ability of an iterative model to stabilize on a fixed solution. The
Converge alternative is that values continually increase and never reach a solution.
Small text files that a Web server sends to client computers. When the
user returns to a site, the browser automatically returns the cookie file.
Cookies Servers use them to keep track of transactions—so they know when the
same user has returned. Marketers have used them to track individual
users on the Web.
A legal ownership right granted to the creators of intellectual property. All
Copyright works are automatically copyrighted. Registering with the copyright
office is not required but grants additional protection to the owner.
A limited number of concrete goals that must be met for the organization
Critical to be successful. Identifying these key factors helps determine the
success factors strategic directions and highlights the areas that can benefit from
improved information systems.
Customer A system for tracking and integrating all customer data. Salespeople,
relationship managers, and clerks all have access to the same data, so everyone has the
management same consolidated view of all customer interactions.
(CRM)
Consists of factual elements (or opinions or comments) that describe some
Data object or event. Data can be thought of as raw numbers or text.
Data MIS manager who is charged with overseeing all of the data definitions
Management Information Systems 125
administrator
Data dictionary
Data
encryption
standard (DES)
Data flow
diagram (DFD)
Data
independence
Data integrity
Data mart
Data mining
Data mirroring
Data store
Data types
Data
warehouse
Database
Database
administrator
A diagramming technique used to analyze and design systems. It shows
how a system is divided into subsystems and highlights the ¬flow of data
beetween the processes and subsystems. It displays processes, external
and data standards entities, files, data flows, and control flows.
for the company to Separating programs from their data definition and storage. The main
ensure that advantage is that it is possible to change the data without having to
applications can change the programs.
share data
throughout the (1) A concept that implies data is as accurate as possible. It means the
company. database contains few errors. (2) Keeping data accurate and correct as it is
gathered and stored in the computer system.
Contains all of the
information to A small version of a data warehouse. A database designed to hold concise
explain the terms collections of data for retrieval and analysis by managers.
used to define a An automated system that examines data for patterns and relationships. It
system. Often is partly based on statistics, but also searches for more specific
includes report associations. The results are not always applicable to other situations.
descriptions, The ultimate backup technique where all data that is stored on one
business rules, and machine is automatically transferred and stored on a second computer.
security Useful to prevent loss of data and recover from disasters—particularly
considerations. when the second computer is located many miles away.
An older method A file or place where data is stored. In a realistic setting, a data store could
of encrypting data be a computer file, a file cabinet, or even a reference book.
that was To humans, there are four basic types of data: text and numbers, images,
commonly used by sound, and video. Each data type must be converted to binary form for
financial computer processing.
institutions. With
current computer A single consolidation point for enterprise data from diverse production
capabilities that systems. The data is typically stored in one large file server or a central
can break a DES- computer. Because legacy systems are difficult to replace, some data is
encrypted copied into a data warehouse, where it is available for management
message, DES is queries and analysis.
no longer A collection of related data that can be retrieved easily and processed by
considered a computers; a collection of data tables.
secure encryption (1) A person appointed to manage the databases for the firm. The DBA
system. needs to know the technical details of the DBMS and the computer
126
(DBA) system. The DBA also needs to understand the business operations of the
firm. (2) A management person in the MIS department charged with
defining and maintaining the corporate databases.
Maintaining data
integrity is a key component of the job.
Database Software that defines a database, stores the data, supports a query
management language, produces reports, and creates data-entry screens.
system (DBMS)
Moving the major operations and decisions out to lower levels within the
Decentralization firm. In MIS, decentralization has largely been led by the declining cost
and improved capabilities of personal computers. See also centralization.
Without models and careful analysis, decisions made by people tend to be
Decision biases biased. There are several biases in each of the four systems categories:
data acquisition, processing, output, and feedback.
The steps required to make a decision. It includes problem identification,
Decision process research, specification of choices, and the final selection. Midlevel
managers are often involved in the initial stages and affect the outcome,
even though they may not make the final decision.
System to use data collected by transaction-processing systems to
Decision support evaluate business models and assist managers in making tactical
system (DSS) decisions. There are three major components: data collection, analysis of
models, and presentation.
A graphical representation of logic rules. Each possible answer to a
Decision tree question or situation leads to a new branch of the tree.
A value that is automatically displayed by the computer. Users can often
override the default by deleting the old value and entering a new one. The
Default value goal is to choose a value that will almost always be entered, so the user
can skip that item.
Descriptive
model
The section in a report that is repeated for every row in the associated
Detail section tables. It is often used for itemized values, whereas group and page
footers are used for subtotals.
Small software modules that provide the interface from an operating
system to a hardware device. Manufacturers improve and rewrite their
Device drivers device drives, so you should periodically update your system to obtain the
newer drivers.
Diagnostic Spotting problems, searching for the cause, and implementing corrections.
Management Information Systems 127
Dial-back modem log in, the dial-back modem breaks the connection and calls back a
predefined phone number. Its use minimizes the threat of outsiders
gaining access to the central computer.
An electronic version of money that is provided and verified by a trusted
Digital cash third party. It consists of an encrypted number for a specified value that
can only be used one time. It provides for verifiable and anonymous
purchases using networks.
Part of an authentication mechanism used with dual-key encryption.
Companies that host servers need to encrypt transactions over the Internet.
Digital certificate They purchase a digital certificate from a certificate authority and install it
on the Web server. The client browser recognizes the certificate key and
encrypts the data.
A visual presentation of broad measures of current activity
in an
Digital dashboard organization. The data is generally displayed as gauges, and the system must be
customized for each organization. As part of an executive
information system, managers can drill down to get more data.
The distance between those individuals or nations who have network
capabilities and those who do not. Despite declining costs, many people
Digital divide and many nations cannot afford the hardware and software. If a large
portion of the economy moves online, it could alienate those who cannot
afford the network connection.
Digital rights A combination of encryption and Internet validation for protecting vendor
management copyrights to prevent unauthorized copying of digital content (software,
(DRM) music, books, movies, and so on).
Any electronic signature technology that verifies the user. U.S. law now
recognizes digital signatures as equivalent to handwritten ones. The most
Digital signature secure system is to obtain a digital certificate from a public company that
verifies each person‟s identity. But the IRS accepts a simple PIN issued
by the agency as a digital signature.
Digital subscriber A special phone service connection available to customers within 3 miles
line (DSL) of the phone company‟s switch. It provides about 1 Mbps transmission
speed for Internet connections.
Digital Direct sequence spread spectrum (DSSS)
video/versatile
disk (DVD)
A digital format traditional computer data. One side of the disk can hold over 3 gigabytes
primarily used for of data.
storing video and A network transmission protocol commonly used for wireless
movies. However, connections. It subdivides the allocated frequency to send multiple
it can also hold packets at the same time. Communication packets can shift frequencies at
audio and each time slot. By making more efficient use of the spectrum, more data
128
can be transmitted.
In an e-commerce context, using a Web-based system to skip over
Disintermediation sections of the production chain, such as manufacturers selling directly to
consumers. The approach can give the manufacturer a higher percentage
of the sale price, but risks alienating retailers, resulting in lost sales.
A central point in a supply chain where incoming bulk goods are split and
merged into multiple shipments to the final destination. For example, a
Distribution truckload of bread would be unloaded and individual boxes placed on
center (DC)
other trucks, along with other food items for distribution to a grocery
store.
The layers of distributors in between the manufacturer and the final
customer. If a producer can gain control over this means of getting the
Distribution product to the consumers, the producer can prevent new rivals from
channel entering the industry. Improved communication systems offer the
possibility of eroding control over some distribution channels.
The property of an iterative model where successive computations keep
Diverge leading to larger values (in magnitude). The model never reaches a stable
solution. Generally due to insufficient or incorrect feedback mechanisms.
Descriptions of a system, its components, the data, and records of changes
Documentation made to the system.
A set of computers on the Internet that converts mnemonic names into
Domain name numeric Internet addresses. The names are easier for humans to
system (DNS) remember, but the computers rely on the numeric addresses.
To transfer files from a remote computer to a local computer (usually a
Download personal computer). See also upload.
To use an information system to get increasingly detailed data about a
company. In an enterprise information system, the ability to look at
Drill down overall company data, and then select breakdowns by regions,
departments, or smaller levels.
Abbreviation given to the many Internet firms formed in the late 1990s
because their Internet names ended with the .com suffix. For a couple of
Dot-com years, having a dot-com name was prestigious and attracted funding.
When hundreds of these firms failed in 2000 and 2001, they became
known as dot-bombs.
A measure of the resolution of devices including printers and displays.
Dots per inch Higher values representing more dots per inch provide more detailed
(dpi) images and text. Some people use the term pixels (ppi) instead of dots.
The action in a data analysis package or executive information system
Drill down where the user clicks a link to obtain more detail about a specific
situation. See also roll up.
Dual-key A method of encrypting a message that requires two keys: one to encrypt
encryption and one to decrypt. One of the keys is a public key that is available to
Management Information Systems 129
End-user development
Dynamic data
exchange
Dynamic host
control protocol
(DHCP)
Dynamic
integration
e-Business
e-
Commerce
(EC)
e-Discovery
E- mail
Electronic data
interchange
(EDI)
Encryption
assigning Internet addresses to a computer. A DHCP server is given a
database with a range of IP addresses and it assigns an unused number to a
computer when it requests one on startup. The process means that IP
anyone. The other addresses on specific computers can change over time unless the computer
key is private and is allocated a static address in the database.
must never be A means of linking data from multiple documents. One compound
revealed to other document (or container) can hold data objects created by other software.
people. RSA is a As the original data is changed, it is automatically updated in the
popular dual-key container document. See also static integration.
encryption system.
Dual-key systems Electronic business. The process of conducting any type of business over
can also be used to the Internet. It includes all forms of e-commerce and m-commerce, as
authenticate the well as internal processes and Web services.
users. Electronic commerce. The process of selling items over the Internet. The
An early method most familiar form is business-to-consumer, but it includes business-to-
of linking data business and auction sites like eBay.
from multiple Electronic discovery. In legal cases, a request for all electronic data—
sources with the particularly e- mail communications, but might also include accounting or
Windows other data from any computer system. Companies establish policies to
operating system. define storage life and destruction policies to ensure old data is deleted
The software automatically from systems.
packages literally Electronic mail, or messages that are transmitted from one computer user
send messages to to another. Networks transfer messages between the computers. Users can
other software send or retrieve messages at any time. The computer holds the message
packages, which until the recipient checks in.
enables them to
Exchanging transaction data with entities outside the control of your firm.
combine and
Private connections can be established directly between two firms. Public
update data. See
networks are also being formed where one provider collects data and
also dynamic
routes it to the appropriate client.
integration as well
as Object Linking A method of modifying the original information according to some code,
and Embedding so that it can be read only if the user knows the decryption key. It is used
(OLE). to safely transmit data between computers.
The standard Managers and workers are to develop their own small systems using
Internet method for database management systems, spreadsheets, and other high- level tools.
130
Enterprise
network
Enterprise
resource planning
(ERP)
The act of creating and organizing a business. Generally, an entrepreneur
Entrepreneurship
takes the risks to create a new business in search of a profit.
The study of how machines can be made to fit humans better. One of the
main conclusions of this research in the computer area is that individuals
Ergonomics
need to be able to adjust input (and output) devices to their own
preferences.
In an encryption system, it is a special key that can be used by
Escrow key government officials to decrypt a secret conversation. The Clipper chip
uses escrow keys.
A network communications protocol that specifies how machines will
exchange data. It uses a broadcast system in which one machine transmits
Ethernet its message on the communication medium. The other machines listen for
messages directed to them.
The concept that various elements of society have obligations to the
Ethics others. In IT, it focuses on the roles of users, developers, and vendors.
A user- interface approach where the user controls the sequence or
operations and the software responds to these events. Events can ra nge
Event-driven from a simple key-press to a voice command. Modern, window-based
approach software does not follow a sequential process. Instead, actions by users
generate events. The programs
.
Report that is triggered by some event to signify a condition that is
Exception report
unusual and needs to be handled immediately.
A type of decision support system that collects, analyzes, and presents
Executive data in a format that is easy to use by top executives. To achieve this
information objective, the EIS is based on a model of the entire company. In most
system (EIS) cases the model is presented graphically and the executives retrieve
information by pointing to objects on the screen.
Testing every possible combination of inputs to search for errors.
Exhaustive
Generally not a feasible option, so most computer systems will always
testing
contain errors.
System with the goal of helping a novice achieves the same results as an
Expert system expert. They can handle ill- structured and missing data. Current expert
(ES) systems can be applied only to narrowly defined problems. Diagnostic
problems are common applications for expert systems.
Expert system A program that provides a way to collect data, enter rules, talk to users,
Management Information Systems 131
shell present results, and evaluate the rules for an expert system.
An older method of exchanging data among various software packages.
One package exports the data by storing it in a format that can be read by
Export
other software. Object Linking and Embedding is a more powerful way to
exchange data.
Extensible
business
reporting
language (XBRL)
Entities that are outside the direct control of your company. Typical
external agents are customers, suppliers, rivals, and governments.
Competitive advantages can be found by producing better-quality items or
External agents services at a lower cost than your rivals. Also, many firms have
strengthened their positions by building closer ties with their suppliers and
customers.
Objects outside the boundary of a system that communicate with the
External entity system. Common business examples include suppliers, customers,
government agencies, and management.
Extraction,
transformation, The process in data warehouses that involves taking data from existing
and loading systems, cleaning it up, and moving it into the data warehouse.
(ETL)
A network configured to give certain outsiders, usually customers and
Extranet suppliers, limited access to data using Web-based systems.
A new version of development loosely based on prototyping. Pairs of
Extreme developers rapidly build and simultaneously test applications. The goal is
programming to build releases and then modify them to meet the changing needs of the
(XP) users.
A combination scanner, transmitter, and receiver that digitizes an image,
Facsimile (Fax) compresses it, and transmits it over phone lines to another facsimile
machine.
The ability of a computer or a system to continue functioning properly
even if some of the components fail. Fault-tolerant machines rely on
Fault tolerance duplication of subsystems with continuous monitoring and automatic
maintenance calls.
A quick examination of the problems, goals, and expected costs of a
Feasibility study proposed system. The objective is to determine whether the problem can
reasonably be solved with a computer system.
Well-designed systems have controls that monitor how well they meet
Feedback their goals. The information measuring the goals and providing control to
the system is known as feedback.
Fiber optic cable A thin glass or plastic cable that is internally reflective. It carries a light
132
(FDM)
A simple communications device for large central computers that accepted
Front-end all of the terminal wires and then assigned each user to an open
processor communications port on the computer. This device decreased the number
of physical access ports required on the computer.
A method of transferring data, usually over phone lines, so that data is
transmitted in both directions simultaneously. In terms of speaker phones,
Full duplex it means that people on both ends of a call can talk at the same time. With
half duplex, the initial speaker blocks others from talking.
Functions See methods.
A way of presenting and analyzing logic problems that is designed to
Fuzzy logic handle subjective descriptions (e.g., hot and cold).
A collection of accounts that break financial data into specific categories.
General ledger Common categories include accounts receivable, accounts payable,
inventory, and cash.
Geographic De¬signed to identify and display relationships among business data and
information locations. Used to display geographical relationships. Also used to plot
system (GIS) delivery routes and create maps.
The IEC definition for billion in binary base 2 (230). It replaces the term
Gibibyte gigabyte which now is to be used for decimal billion.
Approximately 1 billion bytes of data. Technically, 2 raised to the 30th
Gigabyte power or 1024*1024*1024 (3 times). It is one step above megabyte and
one below terabyte..
Global A system of 24 satellites created by the U.S. Department of Defense. The
positioning civilian receivers will identify a location to within about a few feet. Used
system (GPS) for navigation, track vehicles, and plotting delivery routes.
A system that is based on a graphics screen instead of simple text. Users
Graphical user perform tasks by clicking a mouse button on or manipulating objects on
interface (GUI) the screen. For example, copies are made by dragging an item from one
location on the screen to another. Pronounced as “gooey.”
A system that networks multiple computers so that they cooperatively
Grid computing process the designated tasks, effectively functioning as a single computer.
Reports are often broken into subsections so that data in each section is
Group breaks grouped together by some common feature. For example, a sales report
might group items by department, with subtotals for each department.
A type of groupware that is designed to facilitate meetings and help
Group decision groups reach a decision. Each participant uses a networked computer to
support system enter ideas and comments. Votes can be recorded and analyzed instantly.
(GDSS) Comments and discussion are automatically saved for further study.
Software designed to assist teams of workers. There are four basic types:
Groupware communication, workflow, meeting, and scheduling. The most common is
communication software that supports messages, bulletin boards, and data
134
Hacker
Hardware
High-bandwidth
digital content
protection
(HDCP)
High-Definition
Television
(HDTV)
Hot links
Hot site
Hub
Hypertext
markup language
(HTML)
Icon
Import
Information
center
Management Information Systems 135
property books, software, and movies can be protected. The laws clearly define the
owners of the property and specify that the owners can establish any type
of copy protections they desire.
A collection of computers loosely connected to exchange information
worldwide. Owners of the computers make files and information available
Internet to other users. Common tools on the Internet include e-mail, ftp, telnet,
and the World Wide Web.
Planning materials, and labor needed at each step. These results generate schedules
(MRP II) and inventory needs. Sometimes known as a demand-pull system.
A data mining technique pioneered to see if two items are commonly
Market basket
purchased at the same time. Can also be used to identify any pairs of
analysis
items that are associated with each other.
The ability to modify the production line often enough to produce more
Mass variations of the main product. The goal is to cover virtually all of the
customization niche markets.
Materials An early production system, where at each stage of production, we
requirements evaluate the usage of materials to determine the optimal inventory levels.
planning (MRP)
For transmissions, the means of connecting computers in a network.
Media Common methods include twisted-pair and coaxial cable; fiber-optic
lines; and radio, micro, and infrared waves.
The network protocol that governs how data bits are sent across a
connection medium. Almost always implemented in a LAN card. It is
Media access most commonly noticed when you need to control security based on
control (MAC) physical cards—in which case you need the MAC address that is uniquely
assigned to every network interface card.
Loosely, 1 million bytes of data. Technically, it is 1,048,576 bytes of data,
Megabyte which is 2 raised to the 20th power or 1024*1024. The next step up is
gigabyte.
Millions of floating-point operations per second. A measure of the
Megaflops processor speed, it counts the number of common arithmetical operations
that can be performed in one second.
One million cycles per second, a measure of the clock chip in a computer,
Megahertz which establishes how fast a processor can operate.
Describes the source data, and the transformation and integration steps,
Metadata and defines the way the database or data warehouse is organized.
Descriptions of actions that an object can perform. For example, an
employee object could be hired, promoted, or released. Each of these
Methods functions would necessitate changes in the employee attributes and in
other objects. The methods carry out these changes.
One-millionth of a second. Few computer components are measured in
microseconds, but some electrical devices and controllers operate in that
Microsecond range. One microsecond compared to one second is the same as
comparing one second to 11.6 days.
Million A measure of computer processor speed. Higher numbers represent a
instructions per faster processor. However, different brands of processors use different
second (MIPS) instruction sets, so numbers are not always comparable.
Millisecond One-thousandth of a second. Disk drives and some other input and output
Management Information Systems 139
A disk drive unit that stands alone and is connected to the high-speed
Network attached local area network instead of directly to a single computer. Similar to a
storage (NAS) SAN but it uses standard network connections and is accessible to any
computer attached to the network.
The concept that a network becomes more valuable and useful as the
Network effect number of participants increases. In social networks, larger networks
attract more people, enabling them to grow even larger.
Network The communication card that plugs into a computer and attaches to the
interface network communication medium. It translates computer commands into
card (NIC) network messages and server commands.
Network A special operating system installed on a file server, with portions loaded
operating to the client machines. It enables the machines to communicate and share
system (NOS) files.
A high- level Internet service provider offering connections to ISPs. The
Network service
NSP leases high-speed, high-capacity lines to handle the communication
provider (NSP) traffic from hundreds of ISPs.
A collection of artificial neurons loosely designed to mimic the way the
Neural network human brain operates. Especially useful for tasks that involve pattern
recognition.
The fundamental cell of human brains and nerves. Each of these cells is
Neuron relatively simple, but there are approximately 100 million of them.
A set of electronic bulletin boards available on the Internet. Postings are
Newsgroups continuously circulated around the network as people add comments.
A written agreement where the signer agrees to keep certain information
Nondisclosure confidential and not tell anyone. Commonly used by startup companies to
agreement keep basic technology, general operating practices, and marketing plans
(NDA) secret.
A set of rules for creating tables in a relational database. The primary rules
are that there can be no repeating elements and every non key column
Normalization must depend on the whole key and nothing but the key. Roughly, it means
that each table should refer to only one object or concept.
One of the basic data types, similar to text on input and output. Attributes
Numbers include precision and a scaling factor that defines the true size or
dimension of the number.
A software description of some entity. It consists of attributes that
describe the object, and functions (or methods) that describe the actions
Object that can be taken by the object. Objects are generally related to other
objects through an object hierarchy.
Objects are defined from other base objects. The new objects inherit the
Object hierarchy properties and functions of the prior objects.
Object Linking A standard created by Microsoft for its Windows operating system to
and Embedding create compound documents and dynamically link data objects from
Management Information Systems 141
as terminals, disk drives, and printers. It also provides the environment for
other software, as well as the user interface that affects how people use
the machine.
Day-to-day operations and decisions. In a manufacturing firm, machine
settings, worker schedules, and maintenance requirements would represent
Operations level management decisions at the operations level. Information systems are
used at this level to collect data and perform well-defined computations.
Peer-to-peer A method of sharing data and information directly with colleagues and
communication peers, instead of transferring data through a shared central server.
A network configuration in which each machine is considered to be an
Peer-to-peer equal. Messages and data are shared directly between individual
network computers. Each machine continuously operates as both a client and a
server.
A small, portable handheld computer designed primarily to handle
contacts, schedules, e-mail, and short notes. Some models have more
Personal digital advanced features to support documents, spreadsheets, photos, and music.
assistant (PDA) A few have wireless connections; others have to be synchronized with
desktops to transfer e- mail and update schedules. Replaced by smart
phones.
An implementation method that introduces the new system in phases or
Phased steps. One phase is completed before the next is undertaken. The pieces
implementation could be software components, different divisions, different locations, or a
similar split.
Pronounced as fishing. The act of sending out false messages, typically
pretending to be from a bank, in an attempt to get users to provide
usernames and passwords to access sensitive systems. Almost any e- mail
Phishing message purportedly sent to you by a financial institution should be
ignored. Anything that does not include your name should be deleted
immediately.
A standardized system created by Kodak to convert photographs to digital
Photo-CD (bitmap) form and store them on optical disks.
A tool within Microsoft Excel used to extract and organize da ta. It
Pivot table enables users to examine aggregated data and quickly see the
accompanying detail.
Pixel Picture element, or a single dot on an image or video screen.
A means of collecting data immediately when items are sold. Cash
Point of sale registers are actually data terminals that look up prices and instantly
(POS) system transmit sales data to a central computer.
In an object design, different objects can have methods that have the same
name but operate slightly differently. For example, a checking account
Polymorphism object and a savings account object could each have a method called pay
interest. The checking account might pay interest monthly, whereas the
savings account pays it quarterly.
A file format often used on the Internet. It can display documents with
Portable detailed precision, including special fonts and shading. Defined by Adobe,
document format readers are freely available for many machines. Special software must be
(PDF) purchased to create the files.
Precision In computers, numeric precision represents the number of digits stored to
(numeric) the right of the decimal point. So, 10.1234 is more precise than 10.12;
144
however, it is not necessarily more accurate. The original value might not
have been measured beyond two digits.
Model parameters can be estimated from prior data. Sample data is used
Prediction to forecast future changes based on the model.
A column or set of columns that contains data to uniquely identify each
row in a relational database table. For example, each customer must have
Primary key a unique identifier, possibly a phone number or an internally generated
customer number.
(1) The concept that people should be able to go about their lives
without
constant surveillance, that personal information about people should not
Privacy be shared without their permission. (2) Collecting personal data only when
you have a legitimate use for it, allowing customers to correct and
remove personal data. Protecting confidential data so that it is not released
to anyone. Giving customers the option so that you do not sell or lease
their personal data.
Private key In a dual-key encryption system, the key that is protected by the owner
and never revealed. It is generally a very large number.
Problem The line that identifies the primary components of the system that are
boundary creating a specific problem. Subsystems inside the boundary can be
modified to solve the problem or enhance the system. Subsystems outside
the boundary cannot be altered at this time.
Procedures Instructions that help people use the systems. They include items such as
user manuals, documentation, and procedures to ensure that backups are
made regularly.
Process An activity that is part of a data flow diagram. Systems can be built to
process goods or to process data. Most information system work focuses
on processes that alter data.
The use of computers to monitor and control the production machines and
Process control robots. Production lines generally use many different machines, each
requiring several adjustments or settings. Computer control simplifies and
speeds the setup.
Process Evaluating the entire firm to improve individual processes, and to search
innovation for integrated solutions that will reduce costs, improve quality or boost
sales to gain a competitive advantage. See also reengineering.
Processor The heart of a computer. It carries out the instructions of the operating
system and the application programs.
Product The ability to make your products appear different from those of your
differentiation rivals, thus attracting more customers. Information systems have been
used to alter products and provide new services.
Rapid application
development
(RAD)
A type of memory on which data can be stored only one time. It can be
Read Only read as often as needed but cannot be changed. ROM keeps its data when
Memory (ROM) power is removed, so it is used to hold certain core programs and system
data that is rarely changed.
Really simple A technique used with blogs to automatically push new versions down to
syndication subscribers. Users can configure a Web browser to connect to a favorite
(RSS) blogger. New versions are automatically displayed on the browser.
A system consisting of several smaller drives instead of one large drive.
Large files are split into pieces stored on several different physical drives.
Redundant array
The data pieces can be duplicated and stored in more than one location for
of independent
backup. RAID systems also provide faster access to the data, because
Disks (RAID)
each of the drives
can be searching
through their part
of the file at the
same time.
146
Scrolling region
Secondary
storage
Serifs
Server farm
SharePoint
Sign-off
changes to the process, to see how the system will react to external events,
or to examine relationships in more detail.
A comprehensive security authentication system so that users can log in
(sign on) one time. Once the user‟s identity has been established, all
Single sign-on applications obtain the credentials from a central server to recognize the
user and determine access rights.
Contacts with friends and businesspeople. Many Web sites such as Face
Social book, Flicker, and YouTube were built to support social networking—
networking enabling users to find each other and share information online.
A collection of computer programs that are algorithms or logical
Software statements that control the hardware.
The act of fixing problems, altering reports, or extending an existing
Software system to improve it. It refers to changes in the software, not to hardware
maintenance tasks such as cleaning printers.
The act of copying software without paying the copyright owner. W ith
few exceptions (e.g., backup), copying software is illegal. Companies and
Software piracy individuals who are caught have to pay thousands of dollars in penalties
and risk going to jail. It is commonly accepted that piracy takes money
away from the development of improved software.
Collections of software packages that are designed to operate together.
Theoretically, data from each package can be easily shared with data from
the others. So word processors can incorporate graphics, and spreadsheets
Software suites can retrieve data from the database management system. Suites are often
sold at a substantial discount compared to buying each package
separately.
A disk drive replacement or data storage mechanism that uses electronic
components to store data instead of a movable platter. Most SSDs are
Solid state drive similar to flash drives but with greater capacity and faster data transfer
speeds.
Speech The ability of a computer to capture spoken words, convert them into text,
recognition and then take some action based on the command.
A structured query language supported by most major database
management systems. The most common command is of the form:
SQL SELECT column list FROM table list JOIN how tables are related
WHERE condition ORDER BY columns.
Standard A set of procedures that define how employees and managers should deal
operating with certain situations.
procedures
An agreement that specifies certain technical definitions. Standards can be
Standards established by committees or evolve over time through market pressures.
As technology changes, new standards are created.
Management Information Systems 149
Simple HTML pages that are changed only by humans, so they are rarely
Static HTML changed. Generally used only for the repurchases information stage of e-
commerce.
A means of combining data from two documents. A copy of the original is
Static integration placed into the new document. Because it is static, changes made to the original
document are not automatically updated. See also dynamic
integration.
The statistical analysis of measurement data to improve quality. Several
Statistical quality statistical calculations and graphs are used to determine whether
control (SQC) fluctuations are purely random or represent major changes that need to be
corrected.
Strategic
decisions
(SCM)
Synthesizer
Syntax
The set of used by a computer programming language. When writing programs, you
command must type the exact words and symbols so the computer understands what
words, you want it to do. See also programming logic.
symbols, and An electronic device to convert electrical signals into sound. One basic
punctuation technique is FM synthesis, which generates and combines fixed waves to
150
description,
and
discovery, someday your computer could au
integration
(UDDI)
UNIX
Unstable model
Upload
Usenet
User resistance
Value chain
Version control
Video
Management Information Systems 153
Virtual mall
Virus
Visual Basic
Voice mail
Voice over
protocol
Internet phone conversations—instead of traditional phone lin
(VoIP)
154
The ability of a computer to capture spoken words and convert them into
Voice recognition text.
A second generation of Web sites—dedicated to providing shared services
such as the social networking sites. The term is not precisely defined and
Web 2.0 people disagree on what to include, but it excludes first-generation text
and EC sales sites.
Specialized IS worker who is responsible for creating, maintaining, and
Webmaster revising a company‟s World Wide Web site. Webmasters use technical
and artistic skills to create sites that attract browsers.
A network that is spread across a larger geographic area. In most cases,
Wide area
parts of the network are outside the control of a single firm. Long-distance
network (WAN)
connections often use public carriers.
Short for wireless fidelity. An early protocol for defining wireless
connections, commonly used in homes and businesses. It has a relatively
short range (perhaps 100 meters). Transfer speeds initially were less than
WiFi 11 mbps (using 802.11b), but have increased to 54 mbps (802.11a and
802.11g), and are potentially up to 100 or 200 mbps (802.11n). The higher
speeds are achieved by using multiple frequencies at the same time.
Actual speeds are considerably lower (as low as half the rated maximum).
A Web site designed to enable multiple people to create and revise
content. The most famous is Wikipedia where anyone can create
Wiki
encyclopedic entries. The tools can be used for business teamwork
applications.
A portion of the computer screen. You can move each window or change
Window its size. Windows enable you to display and use several applications on
the screen at one time.
A level above knowledge. Wisdom represents intelligence, or the ability to
Wisdom analyze, learn, adapt to changing conditions, and create knowledge.
A type of groupware that is designed to automate forms handling and the
Workflow flow of data in a company. Forms and reports are automatically routed to
software a list of users on the network. When each person adds comments or makes
changes, it is routed to the next process.
Computers attached to a network, designed for individual use. Typically,
Workstations
personal computers.
documents will look exactly the same on the screen as they do when
printed. In addition to format, it means that the printer must have the
same typefaces as the video display. Color printers use a s ystem to
match the colors on the monitor.
A software tool for developers that helps build software applications. It
Application is usually associated with a DBMS but several standalone tools exist to
generator help create new forms and reports.
A wireless technology designed for relatively high speeds and medium
distances—up to several kilometers. It can support point-to-point
transmissions to create high-speed Internet connections to service
Wi-Max providers, or multipoint systems to handle many users at the same time.
Clear wire and Sprint led the way at installing the technology in the
U.S. and joined forces in 2007.
A meeting tool that transmits images and sound of at least one
participant. Often, video cameras are available to everyone involved in
Videoconfe rence the conference. High-end systems enable the participants to control the
cameras.
A stored collection of mathematical equations, representing lines,
circles, and points. These equations can be rescaled to fit any output
Vector image device or to any desired size. Users deal with the base objects, not the
mathematical definitions.
A special program that hides inside another program. Eventually, when the main
Trojan Horse program is run, the Trojan Horse program might delete files, display a message,
or copy data to an external computer.
Simpler hardware than a full-blown personal computer, with minimal software. It
Thin client is generally used to display applications running on the server and to accept input
from the user.
A large, high- resolution video conferencing system that has the goal of providing
Telepresence
a distance meeting as comfortable as in person.
A method of sending data from multiple computers to provide up-to-date
Synchronization data on both computers. Data changes are sent to each computer
participating in the synchronization process to ensure each participant has
the same set of data.
Switch
A network device used to connect machines. Unlike a router, a switch creates a
virtual circuit that is used by a single machine at a time.
Software that stealthily installs itself on your computer, records your activities or
keystrokes. Commonly used by attackers who collect the data to learn your
Spyware account passwords. Extremely dangerous because once installed it can gain total
access to your system. Software scanning tools can spot most common spyware
programs. Windows Vista has other tools to prevent programs from installing
themselves without your knowledge.
Spam Unsolicited commercial e- mail, or junk mail. Unwanted messages sent by
commercial entities or hackers trying to steal your system or your money. It
makes up over 50 percent of e-mail traffic. Most nations have made it illegal, but
156
it is hard to stop. The name refers to a Hormel meat product, but its use is often
attributed to a Monty Python sketch.
A method used by attackers to obtain usernames and passwords to obtain illegal
access to a system. An attacker might call a user and pretend to be a system
Social administrator asking for confirmation of a password. Relatively easy to stop by
engineering never telling your password to anyone. Systems administrators will never need
your password.
A lazy attacker who downloads code from the Internet to attempt to find and
Script kiddies exploit known holes. Can be stopped by ensuring your software contains all
current patches.
The process in any project where people keep trying to add new features to the
project. An easy way to drive a project out of control. As the number of features
Scope creep added begins to exceed the original plan, the costs increase and the project is
delayed.
When designing a RISC processor, the manufacturer deliberately limits the
Reduced number of circuits and instructions on the chip. The goal is to create a processor
instruction set that performs a few simple tasks very fast. More complex problems are solved in
computer (RISC) software. Because RISC processors require fewer circuits, they are easier to
produce.
Prototyping
Pure Internet
plays
Pretty good
privacy (PGP)
An audio message distributed via a Web site designed for storage and playback
Podcast on an Apple iPod. But the term today includes almost any type of audio file
containing messages.
Online A computer system designed to handle daily transactions. It is optimized to
transaction record and protect multiple transactions. Because it is generally not compatible
processing with managerial retrieval of data, data is extracted from these systems into a data
(OLTP) warehouse.
A very short range wireless communication method useful for touch less
Near-field
payments because the short range makes it difficult to intercept the transmission
communication
or misidentify the sender. Typically a range of a few centimeters with a relatively
(NFC)
low bandwidth. Similar to RFID, but with a shorter range.
Joint application A method to reduce design time by putting everyone in development sessions
design (JAD) until the system is designed. Users, managers, and systems analysts participate in a series of
intense meetings to design the inputs (data and screens) and outputs
Management Information Systems
IMPORTANT POINTS
158
(a) Each succeeding phase is more detailed than the phase before it.
(b) Each succeeding phase is less detailed than the phase before it.
(c) Each succeeding phase is as detailed as the phase before it.
(d) None of the above ()
4. Which of the following is a medium for transporting the output of a system of the
input of another system?
(a) Feedback
(c) Interface
5. In what manner, coding and testing are done?
(a) Top-down (b) Bottom up
(c) Cross sectional (d) Ad hoc ()
6. To run the old system and the new system at the same time for specified period, the system implementation approach used is:
(a) Communicating to the user, quickly, how the system, when developed will
look and get a feedback
(b) Making the programmers understand how the system will work
(c) Giving the demonstration of the software tot he system manager
(d) All of the above ()
11. The MIS should developed by:
(a) Daily
(b) Weekly
(c) Monthly
(d) Only onan 'as needed' basis ()
14. Computer information system are most successful n providing information for:
(a) Low level managers need information in the form of detailed report
(b) Reports can be issued on demand periodically, or on the
occurrence of
a specific event
(c) Middle managers use exception reports
(d) All of the above ()
17. A greater proportion of time is spent in planning on the :
(a) Subsystem
(c) Super system
(a) Scanner
(b) bar code reader
(c) POS terminal
(d) All of the above ()
55. Decision tables link conditions and:
(a) Tables (b) programs
(c) Actions (d) None of the above ()
56. In a passenger reservation system, which of the following is the most critical?
(a) Ease of programming
Management Information Systems 165
(a) Testing
(b) Requirement analysis
(c) Total Quality Manage ment
(d) Implementation ()
84. Which one of the following statement is correct:
(a) The study of MIS is about the use of computers
(b) More data means more information for managers
(c) MIS is made to support the lowe r management
(d) MIS is not a complete substitute for effective management ()
85. Which level of management needs detailed information the most:
functioning:
(a) Customer care system (b) Payroll system
(c) Employee information system
(d) Training and development system ()
93. What kind of hardware may be used for DB-backup:
(a) Tap drive
(b) ROM
(c) RAM
170
(d) EEPROM ()
94. .................are usually set to fulfill short term but time and quantity specific targets:
Bibliography